Service Provider Architectures
|
|
- Gillian Anthony
- 8 years ago
- Views:
Transcription
1 Service Provider Architectures Enrico Mercadante 1 Introduction Focus For Today Brief Overview of the Market Segmentation and typical Service Offerings by Service Providers Discussion focusing on Service Provider architectures and relative technologies Focus will be on Architectures that take advantage from the IP protocols suite Questions are GREATLY encouraged 2
2 Technology and Services Technology-driven approach Technology as driver for Services Typically: One <--supports--> One Service Example: PSTN, Basic Access Service-centric approach Services as Driver, Technology as Enabler Typically: One <--supports--> Many Services Example: Integrated Access (Voice/Video/Data) 3 SPs have to sell Profitable Services $ Increase Service Revenue Cost Profitability Revenue Increase revenue Reduce cost of operations Expand addressable market Reduce Operations Cost t 4
3 Service Provider Horizontal Market Segmentation Top Business >500 empl. Addressable Market for a SP in Italy Different -Requirements -Needs -Budgets Residential Business Medium Business empl. Small Business 6-50 empl. Soho 1 5 empl. Residential ,2 M 20 M 5 Many Services, Different s, How many s? e.biscom S OPERATION STRATEGY segments 1 Businesses Different networks used by... Incumbents CLECs Residentials Cable TVs New Broadband SP Voice Data / Video Services 6
4 Value Added Services Enable Revenue Generation Increasing Service Differentiation Video VPN Voice over Data Managed Firewall Service Managed Access Basic Access Profit Per Line 7 Services: Targeting the High-Tech Mfg. Media Banking IT Securities Consumer Products Retail Transport Service Providers Industrial Mfg. Energy Insurance Utilities Healthcare Public Sector Innovators Early Adopters Early Majority Late Majority Laggards 8
5 Bundling SP Offerings to Meet Enterprise Needs Vertical Segmentation Financial Services Retail and Consumer Manufacturing Governement Media and Entertainment SP Services Storage IP VPN IP Telephony Managed Hosting Content Delivery Unified Communications SP Services IP VPN Hosted Applications IP Telephony Mobile Wireless Portals Content Delivery Broadband Access (stores) IP Core IP Contact Center SP Services Managed Hosting Services Hosted Applications IP VPN Content Delivery IP Telephony/ Managed Voice Broadband Access Unified Communications IP Contact Center SP Services Managed Hosting Services Storage Content Delivery Hosted Applications IP VPN IP Contact Center SP Services Security Storage Content Delivery (streaming) Managed Hosting Services IP VPN Mobile Wireless ATM Digital Encryption Digital Asset Management 9 Services When building Services the following tasks must be taken into account: Pricing Billing Marketing (packaging, advertisement) Service Level Agreement Monitoring Fault Management Service Provisioning Technology 10
6 Typical Services for Residential s on a IP capable infrastructure Voice Provided Features: Basic call and Supplementary Srvcs Reliability % (5 min/year outage) Voice Quality: MOS( Mean Opinion Score) > 3.9 ( 1 < MOS <5) Billing: Flat or Time Based Analogue phone compatibility Data Provided Features: Data Access/ Public IP committed speed (ex. 56kbps) Reliability <<99% Billing: Free, Flat or Volume Based Video VCR or DVD quality Reliability 99% # of Channels / Films Billing: Time Based or Per-Film 11 MOS Rating of Digital Voice Codec Bit MIPs Comp. Framing MOS Rate Delay(ms) Size G.711 PCM G.726 ADPCM G.728 LD-CELP G.729 CS-ACELP G.729a CS-ACELP G MPMLQ G ACELP ? 12
7 Typical Services for Business s Data Service Provided Features VPN (intranet) Remote Access to VPN Connectivity Managed Security Reliability 99% Billing: Flat Voice Service Provided Features Basic Call Managed PBX Private Numbering Plan Voice Quality: MOS( Mean Opinion Score) > 3.9 Reliability % (5 min/year outage) Billing: Flat or Time Based 13 Example of Connectivity parameters IP Transfer Delay - L (ms) IP Loss Ratio - P (%) Reachability (%) Average values 75 < L < 85 0 < P < 1,5 99 < R < 100 Optimum range L < 50 P < 2,5 R > 99 Ref. draft Rec. ITU-T Y
8 Virtual Private s Intranet VPN Intranet VPN Provides interconnections between the customer s remote sites and corporate intranet/extranet typically using dedicated connections over a shared network Used by remote and branch offices to connect to headquarters Remote Office Main Office Branch Office / IP, FR, ATM Service Provider 15 Virtual Private s Extranet VPN Extranet VPN Extends corporate intranet services to suppliers, customers, partners or communities of interest over a shared infrastructure typically using dedicated connections over a shared network Architecturally comparable to Intranet VPN with additional traffic control, security and interoperability issues Remote Office Supplier A Main Office Branch Office / IP, FR, ATM Service Provider Supplier B 16
9 Virtual Private s Access VPN Access VPN Provides remote access to corporate intranets/extranets using the shared infrastructure of the service provider(s) but preserving the policies of a private network Used by telecommuters, mobile users or branch offices Service Provider Corporate Intranet / IP, FR, ATM Security Server 17 Platform Definitions DSLAM NAS, Voice Gateway Layer 2 Switch Label Switch Router Premises Router 18
10 Functional View of the SP Infrastructure Premises CPE Access (s) CORE (s) Services And Interconnection -2-2 Device -1-1 Operation Support / Business Support Systems 19 Residential s: Data ( Access) Service Dial Access Access Core Gateways NAS CO CO IP Transport CO Intermedate CO e.g. POS Modem PSTN User Authentication/Authorization Operation Support / Business Support Systems 20
11 Structure Of The Traditional assumption that the was based on a well ordered provider client hierarchy. Transit ISP Transit ISP National ISP National ISP National ISP Regional ISP Regional ISP Regional ISP Regional ISP Local ISP Local ISP Local ISP Local ISP Local ISP 21 Structure Of The The reality is not so ideal Unordered subset of interconnects Driven by business requirements underpinned by performance Non-disclosure and bilateral agreements Peering is now considered a corporate asset & legal concern Transit ISP Transit ISP National ISP National ISP National ISP Regional ISP Regional ISP Regional ISP Regional ISP Local ISP Local ISP Local ISP Local ISP Local ISP 22
12 Structure Of The Shows 626,773 IP addresses 1,007,723 IP links 48,302 ( 52%) of globally routable network prefixes 25,126 peering links Reflects some level of hierarchy Clearly shows lack of order at the periphery Thanks to CAIDA 23 Residential s: Data ( Access) Service DSL Access Premises Access Aggregation CORE Gateways CPE DSLAM xdsl ATM IP Transport e.g. POS Operation Support / Business Support Systems 24
13 Basic DSL Services DSL Service Max. Data Rate Down/Uplink (bps) Copper Pairs Required Analog Voice Support Max. Reach (km-feet) VDSL Very High Bit Rate DSL 52M/12.0M or 8M/8M 1 Yes.9-10,000 ADSL Asymmetric DSL (CAP, DMT) HDSL High Bit Rate DSL SDSL/HDSL2 Symmetric DSL Up to 8M/0.8M 1.5M 2.0M/ 1.5M 2.0M Up to 1.5 Mbps/ 1.5 Mbps 1 Yes ,000 2 No ,000 1 No ,000 IDSL ISDN DSL 144K/144K 1 No ,000 ISDN 128K/128K 1 No , Provisioning Challenge CPE Config 1 3 Truckrolls Duration: 1 2 Weeks Manual Loop Qualification Duration: 3 5 Days Central Office M D F Voice Switch DSLAM MDF-DSLAM Cross-Connect Duration: 2 5 Days Reseller Manual Ordering Processing Duration: Days Multiple NMS, EMS Systems Duration: 1 15 Day Total Working Days 26
14 Residential/Business s: Data ( Access) Service Ethernet to the Home Access Premises CPE Access CORE Gateways Gigabit Ethernet IP Transport e.g. POS Operation Support / Business Support Systems 27 In-Building Connectivity Residential CPE Copper (UTP5) or Fiber Vertical cabling (Ethernet or FE) Layer 2 Switch in the basement Edge IP Ring Typical Residential Building 28
15 Residential/Business s: Data ( Access) and Voice Service Ethernet to the Home Access Premises CPE Access CORE V V Gigabit Ethernet IP Transport H.323 Gatekeepers Voice Gateway V PSTN e.g. POS V Operation Support / Business Support Systems 29 Packet-over-SONET/SDH (PoS) Datagrams Protocol encapsulation Link Initialization PPP Packet Delineation Error Control Byte Delineation IP PPP In Byte Synchronous HDLC Framing SONET/SDH Layer Data Link Layer Physical Layer Point-to-Point Protocol, IETF RFC 1661 PPP in HDLC- Like Framing, IETF RFC 1662 PPP over SONET/SDH, IETF RFC
16 Business s: Data (VPN) Service ATM/Frame Relay Premises CPE Access CORE Frame Relay or ATM ATM Could also be An IP Core Operation Support / Business Support Systems 31 Virtual Private s VPN Services/Technologies Service Architectures VPN-enabling Technologies Access VPN Intranet / Extranet VPN Client Initiated NAS Initiated Overlays: IP Tunnels Virtual Circuits -Based Peering: MPLS-VPN L2TP, IPSec, PPTP GRE, IPSec, MPLS 32
17 Access Technologies- Distance 1000 Mbit/s Mbit/s 155 Mbit/s 100 Mbit/s Mbit/s Mbit/s Mbit/s Mbit/s Mbit/s GE SX 10BASE TX VDSL Shared Wireless LAN PON 100BASE TX 100BASE FL 100BASE SX ADSL GE LX SDH Dedicated lines Frame Relay Cable Modem Km 33 Business s: Data (VPN) Service IP-VPN (MPLS-VPN) Premises CPE (CE router) Access CORE IP/Ethernet or IP/ATM or IP/FR PE router MPLS CORE e.g. POS Operation Support / Business Support Systems 34
18 VPN-IP Address Format VPN-ID IP Address/Mask Length General Format /16 VPN-IPv4 Example VPN-ID is a 64-bit customer identifier Never carried on packets, only in Label tables Two formats (Autonomous System No./ subfield) or (IP Address/ subfield) Each customer network can use Registered IP addresses Illegal, unregistered addresses Private addresses (RFC 1918), e.g. 10.x.x.x 35 Business s: Voice (PBX interconnection) Service Interconnection through Leased Line Premises CPE Access (s) PBX PSTN TDM MUX TDM transport PBX TDM MUX Operation Support / Business Support Systems 36
19 Business s: Voice (PBX interconnection) Service Interconnection through VoIP Premises CPE Access CORE PBX V IP/Ethernet or IP/ATM or IP/FR IP Transport PBX e.g. POS V Operation Support / Business Support Systems 37 Business s: Voice; Data VPN; Access Voice VPN with Leased Line+Data VPN with FR Premises CPE Access s CORE PBX TDM transport TDM MUX Frame Relay ATM PBX TDM MUX TDM transport 38
20 Business s: Voice; Data VPN; Access Integrated Access with MPLS-VPN and H.323 VoIP Premises CPE Access CORE PBX V IP/Ethernet or IP/ATM or IP/FR PE router Voice Gateway MPLS CORE + H.323 Gatekeepers V PSTN V PBX Operation Support / Business Support Systems 39
XDSL and DSLAM Access Technologies
XDSL and DSLAM Access Technologies Abstract What are the differences between the different forms of xdsl technology, such as ADSL and HDSL? How are they implemented. What are the limitations? What are
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationPublic Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.
Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationInternet Dagarna 2000
Internet Dagarna 2000 October 24th 2000 2000, Cisco Systems, Inc. 1 Dennis Davidsson Director Market Development Public Carrier IP Group 2 What s Driving the Demand? 3 How How How Many Many Many of of
More informationOptimizing Networks for NASPI
Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks
More information5.3.1.9 Digital Subscriber Line (DSL) Requirements
UCR 2008, Change 2, Modification #2 provides (DSL) requirements. Section 5.3.1 was modified to reflect this change. Corrections to UCR 2008, Change 2, made by Modification # 2 SECTION NEW Requirements
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationCalculating Bandwidth Requirements
Calculating Bandwidth Requirements Codec Bandwidths This topic describes the bandwidth that each codec uses and illustrates its impact on total bandwidth. Bandwidth Implications of Codec 22 One of the
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationIntranet Security Solution
Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their
More informationWAN and VPN technologies
Chapter 5 WAN and VPN technologies Overview Dedicated, Private Lines T1 and E1 ISDN SONET ATM DSL Frame Relay Gigabit Ethernet VPN and MPLS 1 2 What in common? Dedicated Service All technologies to be
More informationmulti-site, private networking service Uses MPLS access-agnostic transport routing intelligence in the network Class of Service (CoS)
MPLS IP-VPN Overview XO MPLS IP-VPN is a multi-site, private networking service for IP data and voice transport Uses MPLS and is competitive with legacy services such as ATM, Frame-Relay, and long-haul
More informationBuilding integrated services intranets
Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4
More informationBy: Mohsen Aminifar Fall 2014
By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: m.aminifar@modares.ac.ir admin@parsenet.ir Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175
More informationZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:
DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service
More informationExam questions. 1. Which of the following are true regarding xdsl? Choose three. It uses a portion of the existing phone line.
Nguyen Khac Quyet - Take Exam Exam questions Time remaining: 00: 08: 31 1. Which of the following are true regarding xdsl? Choose three. It uses a portion of the existing phone line It is symmetrical It
More informationVision. Paradyne Confidential & Proprietary Page 2
Building One Access Network For Voice, Video & Data Ralf Sattler (Senior Sales Engineer) Vision Paradyne builds dependable equipment used by service providers to deliver voice, video and data services
More informationVoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
More informationConnection Services. Hakim S. ADICHE, MSc
Connection Services Hakim S. ADICHE, MSc adiche@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks
Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationThis course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking
Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses
More informationTELECOMMUNICATION SYSTEMS
TELECOMMUNICATION SYSTEMS IP Networking Through Telecommunication System System Engineering BSc Full-time Overview Phone Line Modems Accoustic modem PSTN modem ISDN modem ADSL XDSL Acoustic modems Connection
More informationVoice Over Internet Protocol (VoIP) Issues and Challenges William McCrum mccrum.william@ic.gc.ca
Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum Phone: +1 613-990-4493 Fax: Email: +1 613-957-8845 mccrum.william@ic.gc.ca Content Network Evolution and drivers VoIP Realizations
More informationProCurve Networking by HP Student guide Technical training. WAN Technologies Version 5.21
ProCurve Networking by HP Student guide Technical training WAN Technologies Version 5.21 Contents Overview Introduction... 1 Course Objectives... 1 Prerequisites... 2 Course Module Overviews... 2 Module
More informationBroadband Service Architecture for Access to Legacy Data Networks over ADSL Issue 1
Technical Report TR-012 Broadband Service Architecture for Access to Legacy Data s over ADSL Issue 1 June 1998 Abstract: This Technical Report specifies an interoperable end-to-end architecture to support
More informationTechnology Brief. Implementing DSL Service for ISPs with the SMS. The DSL Opportunity. DSL is Different from Dial
Technology Brief Implementing DSL Service for ISPs with the SMS The DSL Opportunity Digital Subscriber Line (DSL) services represent a major opportunity for dialup-based Internet Service Providers (ISPs)
More informationSecure Network Design: Designing a DMZ & VPN
Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network
More informationUS Data Services 2014-2019
US Data Services 2014-2019 Executive Summary CMR Market Research April 2015 Reproduction without permission 1 The contents of this report represent CMR s analysis of the information available to the public
More informationAnalysis of xdsl Technologies
International Journal of Electronics and Computer Science Engineering 897 Available Online at www.ijecse.org ISSN- 2277-1956 Analysis of xdsl Technologies Dimple Saproo 1, Megha Goyal 2, Asha Bhagashra
More informationVoice over IP Technologies
Voice over IP Technologies Voice Over IP Overview VoIP is an emerging technology that allows voice calls to be made over an IP network. Vendors have been pushing VoIP for a few years, but many potential
More informationIntel System Engineers Documents. DSL General Overview
Intel System Engineers Documents DSL General Overview Alex Lattanzi SC LAR Whatt IIs Brroadband? Broadband describes a number of different technologies that deliver digital data to homes and businesses
More informationObjectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationResidential Broadband: Technologies for High-Speed Access To Homes
Residential Broadband: Technologies for High-Speed Access To Homes The Ohio State University Columbus, OH 43210-1277 1277 http://www.cse.ohio-state.edu/~jain/ 1 Overview 56 kbps Modems, ISDN ADSL, VDSL
More informationBroadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.
Broadband Networks Prof. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Mumbai Lecture - 32 Metro Ethernet Access Networks So, in today s lecture we will talk about
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More informationIP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
More informationAlcatel 7300 ASAM. Advanced Services Access Manager (ETSI Version) Release 4.3/4.4
Alcatel 7300 ASAM Advanced Services Access Manager (ETSI Version) Release 4.3/4.4 The Alcatel 7300 Advanced Services Access Manager (ASAM) uses DSL technology to deliver high-bandwidth access and new revenue-generating
More informationDeploying IP-based Virtual Private Network Across the Global Corporation
Deploying IP-based Virtual Private Network Across the Global Corporation STANISLAV MILANOVIC Serco Group plc Via Sciadonna 24/26, 00044 Frascati (RM) ITALY ZORAN PETROVIC Faculty of Electrical Engineering
More informationMP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
More informationHands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
More informationWAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
More informationHIGH CAPACITY DSL-SYSTEMS
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) HIGH CAPACITY DSL-SYSTEMS Oulu, March 2006 Page 2 EXECUTIVE SUMMARY In this
More informationManaged Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID
Managed Services The The Road to Revenue Pravin Mahajan pmahajan@cisco.com Session Number 1 Agenda Managed Services Introduction Solution Offerings Market to Services Mapping Summary 2 High Business Interest
More information1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class
1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,
More informationSession 4.1. Network Planning Strategy for evolving Network Architectures Session 4.1-1. Service matrix forecasting. Broadband
ITU Seminar Warsaw, Poland, 6-10 October 2003 Session 4.1 Service and applications matrix forecasting Network Planning Strategy for evolving Network Architectures Session 4.1-1 Service matrix forecasting
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationWAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham
WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham 1 Wide-area Networks (WANs) 2 Metropolitan-Area Network (MANs) 3 Path Determination 4 Internetworking Any internetwork must include
More informationBroadband 101: Installation and Testing
Broadband 101: Installation and Testing Fanny Mlinarsky Introduction Today the Internet is an information superhighway with bottlenecks at every exit. These congested exits call for the deployment of broadband
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationOptimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth
More informationTELECOMMUNICATIONS STANDARDS ADVISORY COMMITTEE TSAC WORKING GROUP ON NEW STANDARDS AND POLICY (NSP)
TELECOMMUNICATIONS STANDARDS ADVISORY COMMITTEE TSAC WORKING GROUP ON NEW STANDARDS AND POLICY (NSP) Introduction Development of Digital Subscriber Line (DSL) Technology This paper introduces the development
More informationHow Virtual Private Networks Work
How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater
More informationVOLUME 1, SECTION 9: TECHNICAL NARRATIVE TO AMPLIFY TECHNICAL NARRATIVE TABLES
VOLUME 1, SECTION 9: TECHNICAL NARRATIVE TO AMPLIFY TECHNICAL NARRATIVE TABLES In Section 9.0 each of the technical volume narrative requirements for mandatory services and optional services proposed by
More informationEthernet Passive Optical Networks EPON
Ethernet Passive Optical Networks EPON IEEE 802.3 Ethernet in the First Mile Study Group January 8-9, 2001, Irvine, CA Gerry Pesavento Alloptic, Inc. Tel 925-245-7647 Email gerry.pesavento@alloptic.com
More informationBlack Box Explains: DSL
Black Box Explains: DSL History It was realized as early as the late eighties, early nineties, that conventional data transmission systems did not meet the requirements of the growing internet community
More informationICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
More informationWHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? This document provides an overview of the Cox Business portfolio of business networking services and explains why customers should consider
More informationCase Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER
CHAPTER 5 The following two case studies are provided as reference material for implementing p2p GRE over IPsec designs. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study This
More informationVoice over IP. Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries
Voice over IP Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Latin American Networking School (Fundación EsLaRed)
More informationCOMPLETE YOUR GO-TO-MARKET PLAN BUSINESS SOLUTIONS BARRY DERRICK PRODUCT MARKETING MANAGER
COMPLETE YOUR GO-TO-MARKET PLAN BUSINESS SOLUTIONS BARRY DERRICK PRODUCT MARKETING MANAGER AGENDA ADTRAN OVERVIEW GO-TO-MARKET WITH WINNING SOLUTIONS! Market Leading Cloud Connectivity Solutions that Outperform
More informationResidential Broadband: Technologies for High-Speed Access To Homes
Residential Broadband: Technologies for High-Speed Access To Homes Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/cis788-97/ Email questions to mbone@netlab.ohio-state.edu
More informationChapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)
Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international
More informationTraffic Forecasting Models for the Incumbent Based on New Drivers in the Market
Traffic Forecasting Models for the Incumbent Based on New Drivers in the Market KJELL STORDAHL Kjell Stordahl (58) received his M.S. in statistics from Oslo University in 1972. He worked with Telenor R&D
More informationMPLS VPN Technology. Overview. Outline
MPLS VPN Technology Overview This module introduces Virtual Private Networks (VPN) and two major VPN design options overlay VPN and peer-to-peer VPN. VPN terminology and topologies are introduced. The
More informationAbout Cablenet. Ownership. Shareholders are:
An Overview About Cablenet Ownership Cablenet is a privately owned company that offers telecommunication and entertainment services to the corporate and retail markets. Shareholders are: CN Shiacolas Group
More informationE1-E2 (EB) Chapter 8A. Broadband Services
E1-E2 (EB) Chapter 8A Broadband Services 8A. Broadband and Broadband Services 8A.1 Introduction In toady s globally networked society through internet, there is always increasing demand for higher capacity
More informationChallenges and Solutions in VoIP
Challenges and Solutions in VoIP Challenges in VoIP The traditional telephony network strives to provide 99.99 percent uptime to the user. This corresponds to 5.25 minutes per year of down time. Many data
More informationOverview of WAN Connections Module 1
Overview of WAN Connections Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this
More informationConfiguring MPLS VPN & Remote Access. 12- ian- 2010
Configuring MPLS VPN & Remote Access 12- ian- 2010 What this lecture is about: Quick recap of MPLS and MPLS VPN. MPLS VPN configurahon. Cable technologies. DSL technologies. 3 MPLS VPN Reminder First,
More informationSmall, Medium and Large Businesses
Providing Productivity and Security for Small, Medium and Large Businesses Series Series Super Fast broadband technology High Availability with Multi-WAN Load Balancing Enterprise-level Firewall security
More informationWholesale Internet Service Schedule
Our Wholesale Internet Service provides a high quality, reliable, dedicated permanent connection to the TOPG Network. It is intended for customers who want to resell access to the Internet. 1. Access Connections
More informationX.25 over IP. The Challenge. How it Works. Solution
over IP The Challenge Legacy services such as are still in use worldwide for a range of applications. Over the years, many customers have made significant investments in equipment and processes that depend
More informationIPv6 Migration Challenges for Large Service Providers
IPv6 Migration Challenges for Large Service Providers Aruna P General manager Network Operation Agenda Airtel Overview Drivers of IPV6 Migration challenges Design Considerations Deployment plan Airtel
More informationReti Private Virtuali - VPN
1 Reti Private Virtuali - VPN Marco Misitano, CISSP Enterprise Conulting, Security misi@cisco.com Ordine degli Ingegneri della Provincia di Milano 2 Agenda Technology introduction Remote Access VPN Site
More informationSolving the Access Conundrum for the All-IP Network:
Solving the Access Conundrum for the All-IP Network: Business Service Delivery Across Diverse Infrastructures London, June 27 th, 2006 Presented by: Dr. Yuri Gittik Chief Strategy Officer yuri_g@rad.com
More informationAvaya IP Office. Converged Communications. Contact Centres Unified Communication Services
Avaya IP Office Converged Communications Streamlining and simplifying communications by bringing your voice, data and Internet all together IP Telephony Contact Centres Unified Communication Services Simplicity
More informationWholesale IP Bitstream on a Cable HFC infrastructure
Wholesale IP Bitstream on a Cable HFC infrastructure In order to understand the issues related to an ISP reselling Cable Based Internet access it is necessary to look at similarities and dissimilarities
More informationWireless DSL in Action The Advantage of WiMAX based wireless DSL for incumbent and competitive operators. White Paper
Wireless DSL in Action The Advantage of WiMAX based wireless DSL for incumbent and competitive operators White Paper The Need to go Wireless In remote areas where wired infrastructure is not available
More informationCisco DSL. Solutions. Foundation for New World Services
Cisco DSL Solutions Foundation for New World Services Cisco Global DSL unlocks the massive opportunity for broadband and makes digital subscriber line (DSL) available to any user, any place with any service.
More informationADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
More informationApplication Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.
Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management
More informationICTNPL5071A Develop planning strategies for core network design
ICTNPL5071A Develop planning strategies for core network design Release: 1 ICTNPL5071A Develop planning strategies for core network design Modification History Not Applicable Approved Page 2 of 15 Unit
More informationGenexis FTTH Network Architecture
Genexis FTTH Network Architecture An introduction to the Genexis FTTH Network Architecture This document contains general information about the Genexis FTTH Network Architecture. Contents 1. Introduction...2
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R F l e x i b l e N e t w o r k - B a s e d, E n t e r p r i s e - C l a s s I P
More informationVPN Technologies: Definitions and Requirements
VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.
More information1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
More informationMeeting the challenge of voice services
Meeting the challenge of voice services Executive Summary Making the most of convergence to bridge the gap between IT networks and traditional telephony. This white paper is aimed at IT support companies
More informationChallenges in Future Wireless Broadband Access Networks
Challenges in Future Wireless Broadband Access Networks C1 Öffentlich / Public Version 1.0 Dr. Andreas Jungmaier Network Strategy & Assessment / TNS Vodafone D2 The Future of Broadband Wireless 26. Treffen
More informationWAN Design Guide The Lower Layers August 2005
ProCurve Networking by HP WAN Design Guide The Lower Layers August 2005 Introduction... 5 Secure WAN Design Overview... 5 Understanding the Customer Requirement... 5 Overview of WAN Environments... 7 What
More informationSHDSL in Ericsson ENGINE Access Ramp
High speed in both directions for SMEs! White aper Symmetrical High bitrate DSL for Small/Medium Enterprises SHDSL in Ericsson ENGINE Access Ramp Symmetrical High bit rate DSL for Small/Medium Enterprises
More informationCopyright. Transport networks. Physical layer Transport and access networks. Pag. 1
Physical layer Transport and access networks Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ COMPUTER NETWORK DESIGN Physical layer review - 1 Copyright Quest opera è protetta dalla
More informationCourse 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationVoice over Internet Protocol (VoIP) - An Introduction
PITCOM Voice over Internet Protocol (VoIP) - An Introduction Peter Ingram Chief Technology Officer Ofcom 18th January 2005 Ofcom What is Voice over IP? Carrying Voice Traffic on Networks Designed for Data
More informationERserver. iseries. Remote Access Services: PPP connections
ERserver iseries Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections Copyright International Business Machines Corporation 1998, 2002. All rights reserved.
More informationFundamentals of Network Security Graphic Symbols
Fundamentals of Network Security Graphic Symbols Overview Router Figure 1: IOS Router icon and photos A Router is an internetworking device which operates at OSI Layer 3. A Router interconnects network
More information